> WHOAMI
I’m Saeed Bala Ahmed, a devoted enthusiast of the ‘Mr. Robot’ series, from which I derived my nickname, r0b0tG4nG. With 5 years of experience in the cybersecurity field, I currently hold the position of Vulnerable Machine Engineer at Offensive Security. My profound passion lies in penetration testing, bug hunting, CTFs, and various security-related domains. I devote a significant portion of my time to conquering vulnerable systems on platforms such as EchoCTF.Red, PwnTillDawn, HackTheBox, and Proving Grounds.
> CERTIFICATIONS
Offensive Security Certified Professional (OSCP)
Offensive Security Web Assessor (OSWA)
eLearnSecurity Certified Professional Penetration Tester (eCPPTv2)
eLearnSecurity Web Application Penetration Tester (eWPT)
Certified Network Security Specialist
Professional Diploma In Software Engineering
> ACHIEVEMENTS
15 Exploits Published On Exploit-DB
Verify Exploit-DB
8x International Hacking Competitions Winner.
=> 2x BCA CTF Winner.
=> 2x Sans CTF Winner.
=> 2021 Africa Cyber Defense CTF winner.
=> 2nd RunnerUp PwnTillDawn Goodwill CTF.
=> 2022 Africa Cyber Defense CTF Winner.
=> 2022 PwnTillDawn Africa & Middle East CTF Winner.
> WORK EXPERIENCE
Penetration Tester at Data Systems LTD
At Data Systems LTD, my responsibilities extended beyond conducting penetration tests on computer systems, networks, and applications. I also innovated new testing methodologies to uncover vulnerabilities, performed security audits, and executed legal cyberattack simulations. This involved the development and utilization of specialized hacking tools to access specific data within predetermined timeframes.
CTF Team Lead / Offensive Trainer at Inveteck Global
At Inveteck Global, my role involves active participation in various Capture The Flag (CTF) events and hacking competitions, alongside training students. As a CTF Team Lead, I’ve had the privilege of competing and achieving victory in six international hacking competitions, as well as securing victories in several local competitions.
Content Developer at Servmor Security
At Servmor Security, my responsibility involved the development of training labs similar to those found on platforms like Hack The Box. These labs were designed to provide cyber security researchers with a practical environment to enhance their hacking skills. The labs encompassed a range of vulnerabilities, including the OWASP Top 10, and incorporated custom-designed vulnerabilities to replicate real-world scenarios.
Security Researcher / Bug Hunter
I specialize in researching vulnerabilities associated with web applications. My work involves uncovering T1-T4 bugs within a variety of web applications, spanning both private sector and government domains. Some of my research findings have been publicly documented on exploit-db.
> FAVORITE TOOLS
hmm 🤔 depends on the job